cyber security
Across
- 3. (of software) designed to detect and destroy computer viruses
- 7. an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.
- 9. a standalone malware computer program that replicates itself in order to spread to other computers
- 12. a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
- 14. a secret word or phrase that must be used to gain admission to a place.
- 15. the art of tricking or manipulate to get someone to revel their personal information
Down
- 1. looking at someone's information over their shoulder, for example looking at someone enter their PIN in a shop or at a cashpoint. A person can prevent this by using their hand to cover the keypad as they type their PIN, or being aware of people around them when typing in PINs.
- 2. having or showing a cautious distrust of someone or something.
- 4. the process or action of proving or showing something to be true, genuine, or valid.
- 5. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 6. are body measurements and calculations related to human characteristics. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
- 8. an identification used by a person with access to a computer, network, or online service.
- 10. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- 11. the action of obtaining something by using persuasion or guile the action of obtaining private or confidential information by impersonation or another method of deception
- 13. any malware that misleads users of its true intent.